Zobrazeno 1 - 10
of 95
pro vyhledávání: '"Inter-procedural dataflow analysis"'
Autor:
Sun, Zewen, Zhang, Yujin, Xu, Duanchen, Zhang, Yiyu, Qi, Yun, Wang, Yueyang, Li, Yi, Wang, Zhaokang, Li, Yue, Li, Xuandong, Zuo, Zhiqiang, Lu, Qingda, Peng, Wenwen, Guo, Shengjian
Apart from forming the backbone of compiler optimization, static dataflow analysis has been widely applied in a vast variety of applications, such as bug detection, privacy analysis, program comprehension, etc. Despite its importance, performing inte
Externí odkaz:
http://arxiv.org/abs/2412.12579
Autor:
Hsieh, Chu-An, 謝居安
102
Many Android applications have improper use of sensitive data, which may introduce serious privacy violation. We call the access and use of sensitive data as sensitive behaviors. To discover sensitive behaviors, static analysis of sensitive
Many Android applications have improper use of sensitive data, which may introduce serious privacy violation. We call the access and use of sensitive data as sensitive behaviors. To discover sensitive behaviors, static analysis of sensitive
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/82848179682605750114
Publikováno v:
Cybersecurity, Vol 3, Iss 1, Pp 1-19 (2020)
Abstract The Integer-Overflow-to-Buffer-Overflow (IO2BO) vulnerability has been widely exploited by attackers to cause severe damages to computer systems. Automatically identifying this kind of vulnerability is critical for software security. Despite
Externí odkaz:
https://doaj.org/article/e4dce26b95a9424cbc4f7f5011ff8c3a
Publikováno v:
Cybersecurity, Vol 3, Iss 1, Pp 1-19 (2020)
The Integer-Overflow-to-Buffer-Overflow (IO2BO) vulnerability has been widely exploited by attackers to cause severe damages to computer systems. Automatically identifying this kind of vulnerability is critical for software security. Despite many wor
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Zhang, Xiaohan, Wang, Jinwen, Cheng, Yueqiang, Li, Qi, Sun, Kun, Zheng, Yao, Zhang, Ning, Li, Xinghua
Publikováno v:
IEEE/ACM Transactions on Networking; February 2024, Vol. 32 Issue: 1 p613-626, 14p
Autor:
Boukhtouta, A.1 (AUTHOR) a_boukh@encs.concordia.ca, Alhadidi, D.1 (AUTHOR), Debbabi, M.1 (AUTHOR)
Publikováno v:
Information Security Journal: A Global Perspective. Mar2009, Vol. 18 Issue 2, p87-98. 12p.
Autor:
Feng, Pengbin1 (AUTHOR) pbfeng@xidian.edu.cn, Yang, Li2 (AUTHOR), Lu, Di2 (AUTHOR), Xi, Ning1 (AUTHOR), Ma, Jianfeng1 (AUTHOR)
Publikováno v:
Journal of Supercomputing. Sep2023, Vol. 79 Issue 14, p15390-15414. 25p.
Kniha
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
MALLISSERY, SANOOP1 sanoopmallissery@gmail.com, YU-SUNGWU1 ysw@nycu.edu.tw
Publikováno v:
ACM Computing Surveys. Mar2024, Vol. 56 Issue 3, p1-38. 38p.